Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-43575 | 9.8 CRITICAL | OpenClaw 2026.2.21 < 2026.4.10 - Authentication Bypass in Sandbox noVNC Helper Route |
| CVE-2026-43581 | 9.6 CRITICAL | OpenClaw < 2026.4.10 - Chrome DevTools Protocol Exposure via Overly Broad CDP Relay Bindin |
| CVE-2026-43578 | 9.1 CRITICAL | OpenClaw 2026.3.31 < 2026.4.10 - Privilege Escalation via Missed Async Exec Completion Eve |
| CVE-2026-44110 | 8.8 HIGH | OpenClaw < 2026.4.15 - Authorization Bypass in Matrix Room Control Commands via DM Pairin |
| CVE-2026-44115 | 8.8 HIGH | OpenClaw < 2026.4.22 - Shell Expansion Bypass in Unquoted Heredocs via Exec Allowlist |
| CVE-2026-43584 | 8.8 HIGH | OpenClaw < 2026.4.10 - Insufficient Environment Variable Denylist in Exec Policy |
| CVE-2026-44116 | 8.6 HIGH | OpenClaw < 2026.4.22 - Server-Side Request Forgery in Zalo Photo URL Validation |
| CVE-2026-43585 | 8.1 HIGH | OpenClaw < 2026.4.15 - Bearer Token Validation Bypass via Stale SecretRef Resolution |
| CVE-2026-44114 | 7.8 HIGH | OpenClaw < 2026.4.20 - Environment Variable Namespace Collision via Workspace dotenv |
| CVE-2026-44118 | 7.8 HIGH | OpenClaw < 2026.4.22 - Owner Context Spoofing via Bearer Token Header |
| CVE-2026-43580 | 7.7 HIGH | OpenClaw < 2026.4.10 - Incomplete Navigation Guard Coverage in Browser Interactions |
| CVE-2026-43576 | 7.7 HIGH | OpenClaw < 2026.4.5 - Second-hop SSRF via CDP /json/version WebSocket URL |
| CVE-2026-43579 | 6.5 MEDIUM | OpenClaw < 2026.4.10 - Insufficient Access Control in Nostr Profile Mutation Routes |
| CVE-2026-43577 | 6.5 MEDIUM | OpenClaw < 2026.4.9 - Arbitrary File Read via Browser Interaction Routes |
| CVE-2026-43582 | 6.3 MEDIUM | OpenClaw < 2026.4.10 - DNS Rebinding SSRF via Hostname Validation Bypass |
| CVE-2026-44117 | 5.8 MEDIUM | OpenClaw < 2026.4.20 - Server-Side Request Forgery in QQBot Direct Media Upload |
| CVE-2026-43583 | 5.3 MEDIUM | OpenClaw 2026.4.10 < 2026.4.14 - Loss of Group Tool-Policy Context in Delivery Queue Recov |
| CVE-2026-44113 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Time-of-Check/Time-of-Use Race Condition in OpenShell FS Bridge |
| CVE-2026-44112 | 5.3 MEDIUM | OpenClaw < 2026.4.22 - Symlink Swap Race Condition in OpenShell FS Bridge Writes |
| CVE-2026-44111 | 4.3 MEDIUM | OpenClaw < 2026.4.15 - Arbitrary Markdown File Read via QMD memory_get |
No comments yet